night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Bad Bots in the Agentic Age
Tim Chang
Bad Bots in the Agentic Age: What the 2026 Thales Bad Bot Report Reveals

The modern internet is becoming less human by the day. Bot traffic is increasing, and human traffic is shrinking. Malicious automated traffic is getting harder to spot. The…

Read More
Enhancing Trust in Hong Kong’s Cloud-Powered Banking Sector
Wayne HUI
Enhancing Trust in Hong Kong’s Cloud-Powered Banking Sector

Quantum computing, data security, and technological complexity are becoming increasingly critical business considerations for Hong Kong’s banking sector, which nearly all…

Read More
Infrastructure Modernization: Sovereign Cloud Category
Thales
Thales named a 2026 Google Partner of the Year – Infrastructure Modernization: Sovereign Cloud Category

Thales was recognized with a 2026 Google Cloud Partner of the Year award in the Infrastructure Modernization: Sovereign Cloud category. This award highlights partners who have…

Read More
Device-Bound Passkeys: A Practical Path to Phishing-Resistant Enterprise Authentication
Aboubacar Diawara
Device-Bound Passkeys: A Practical Path to Phishing-Resistant Enterprise Authentication

Identity has become the primary attack surface in the enterprise. Credential theft continues to drive the majority of breaches, and attackers are getting more effective at…

Read More
The Impact of AI on Digital Sovereignty
Marcelo Delima
The Impact of AI on Digital Sovereignty

Artificial intelligence (AI) is reshaping how organizations operate, compete, and innovate. From predictive analytics and automation to generative AI and decision support, AI…

Read More
Why Database Security Must Go Beyond Perimeter Controls
Randy Hildebrandt
Why Database Security Must Go Beyond Perimeter Controls

Modern database security failures rarely begin with a broken firewall. They begin with valid credentials, legitimate access paths, and trusted users or applications doing…

Read More